Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 23:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
476a87929a4401c735873d1fd4b20994.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
476a87929a4401c735873d1fd4b20994.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
476a87929a4401c735873d1fd4b20994.exe
-
Size
21KB
-
MD5
476a87929a4401c735873d1fd4b20994
-
SHA1
6b327de8a723a34ef126df0b9437f83d0112ce3d
-
SHA256
e21ae8ef645b466f0ebb3a5b252ee137ec2e12da35e4a3919f408e8fea1b8c7f
-
SHA512
eda63508e57826a0cf4024a52746140ae88e5a5c57d93dcc76101882d4a40ca6b61d0e4500c6453d250b9147723be6e6c04941d626217056c3da1d1308308e5b
-
SSDEEP
384:9iWO48f+Z8N8p/ij7m+1Is9giJw24aI71Z3fXGcMA4wh6+zuFb5:u4hZ1p/ija+1IGpAd71x/GcMA4k6uuF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 476a87929a4401c735873d1fd4b20994.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 476a87929a4401c735873d1fd4b20994.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1204 3032 476a87929a4401c735873d1fd4b20994.exe 18 PID 3032 wrote to memory of 1204 3032 476a87929a4401c735873d1fd4b20994.exe 18 PID 3032 wrote to memory of 1204 3032 476a87929a4401c735873d1fd4b20994.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\476a87929a4401c735873d1fd4b20994.exe"C:\Users\Admin\AppData\Local\Temp\476a87929a4401c735873d1fd4b20994.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204